【資安漏洞預警】SAP針對旗下2款產品發布重大資安公告(CVE-2025-42928) (CVE-2025-42880)
[Security Vulnerability Alert] SAP has issued a critical cybersecurity advisory for two of its products (CVE-2025-42928) and (CVE-2025-42880).

發布單位:圖資處數位服務組
日期範圍:2025/12/16 ~ 2026/6/16
 
發布單位:圖資處數位服務組
日期範圍:2025/12/16 ~ 2026/6/16
行政 行政公告
全體

轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202512-00000005

[內容說明]
【CVE-2025-42928,CVSS:9.1】 此漏洞為反序列化漏洞,具備高權限的使用者可能利用此漏洞,觸發遠端程式碼執行攻擊,影響系統的機密性、完整性和可用性。

【CVE-2025-42880,CVSS:9.9】 由於缺乏輸入過濾機制,SAP Solution Manager允許已驗證的攻擊者在呼叫支援遠端的功能模組時植入惡意程式碼,可能影響系統的機密性、完整性和可用性。

[影響平台]
【CVE-2025-42928】 SAP jConnect - SDK for ASE SYBASE_SOFTWARE_DEVELOPER_KIT 16.0.4, 16.1版本

【CVE-2025-42880】 SAP Solution Manager ST 720版本

[建議措施]
根據官方網站釋出的解決方式進行修補: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/december-2025.html

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202512-00000005

[Content Description]
【CVE-2025-42928, CVSS: 9.1】 This vulnerability is a deserialization vulnerability. A user with high privileges could exploit this vulnerability to trigger a remote code execution attack, affecting the confidentiality, integrity, and availability of the system.

【CVE-2025-42880, CVSS: 9.9】 Due to the lack of input filtering mechanisms, SAP Solution Manager allows a verified attacker to inject malicious code when calling remote support function modules, potentially affecting the confidentiality, integrity, and availability of the system.

[Affected Platforms]
【CVE-2025-42928】 SAP jConnect - SDK for ASE SYBASE_SOFTWARE_DEVELOPER_KIT 16.0.4, 16.1 versions

【CVE-2025-42880】 SAP Solution Manager ST version 720

[Recommended Actions]
Patch according to the solutions released on the official website: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/december-2025.html


相關附件
Top↑